People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
The tension between privacy and awareness has been a persistent difficulty in distributed environments that support opportunistic and informal interaction. For example, many aware...
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...